Internet Security

Can Computational Storage Mitigate Ransomware Threats Effectively?
Malware & Threats Can Computational Storage Mitigate Ransomware Threats Effectively?

Ransomware continues to be a pervasive and damaging cybersecurity threat. The scope of ransomware's impact is underscored by major advisories and reports, including those from the FBI, CISA, and the 2024 Cost of a Data Breach report by the Ponemon Institute, which highlights average payouts

Critical Vulnerabilities Found in Palo Alto and SonicWall VPN Clients
Malware & Threats Critical Vulnerabilities Found in Palo Alto and SonicWall VPN Clients

In a world where remote work has become the new norm, the security of Virtual Private Network (VPN) clients is paramount, as they safeguard the continuous and secure connection between employees and their corporate networks. However, recent discoveries by cybersecurity researchers have uncovered

Passkeys: The Future of Online Security Beyond Traditional Passwords
Identity & Access Management Passkeys: The Future of Online Security Beyond Traditional Passwords

The digital age has brought about numerous advancements, transforming how we interact, communicate, and conduct business. However, as technological innovation has progressed, so have the threats against it. Traditional passwords, once considered the cornerstone of online security, are proving

How Did RomCom Exploit Zero-Day Vulnerabilities in Firefox and Windows?
Malware & Threats How Did RomCom Exploit Zero-Day Vulnerabilities in Firefox and Windows?

In a recent campaign, the notorious Russia-aligned APT group RomCom exploited two zero-day vulnerabilities to deliver a backdoor to unsuspecting victims. The vulnerabilities in question were CVE-2024-9680 in Firefox and CVE-2024-49039 in Windows Task Scheduler. According to ESET researchers, these

Is Switzerland's Postal Service the New Medium for Malware Attacks?
Malware & Threats Is Switzerland's Postal Service the New Medium for Malware Attacks?

Imagine receiving an official-looking letter in the mail, urging you to scan a QR code to download a severe weather warning app to keep you informed about potential natural disasters. This scenario may seem like an ordinary move from public authorities to ensure public safety, but in Switzerland,

How Can You Prevent Employment Fraud in Remote Work Settings?
Identity & Access Management How Can You Prevent Employment Fraud in Remote Work Settings?

With the rise of remote work, the latest technologies, and the increased difficulty of meeting employees face-to-face, there has been an unprecedented opportunity for job applicants to conceal their true identities and commit employment fraud. This scenario presents a significant challenge for

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later